SSCP | Systems Security Certified Practitioner

COURSE OVERVIEW

The best entry level IT security certification

The SSCP certification from (ISC)² is ideal for security practitioners who want to elevate their level of expertise in system security.

On-Demand, Bootcamp or Virtual Classroom options

Access online course content, videos, exercises, discussions and chats

Pre and post course assessments

Virtual labs for hands-on experience

Live lab add-ons available

Develop real-life skills you can apply in the workplace with Live Labs

Access to over 25,000 e-books and 30,000 downloadable video tutorials

Expert mentoring and coaching to answer questions and guide your learning

Course completion certificates

Cybersecurity Career Guide

*
*
*
*
 

1

GREAT OPPORTUNITY

Certifications like the SSCP provide lucrative opportunities for security specialists who are willing to train on a new skill.

2

LEARN IN-DEMAND SKILLS

The demand for IT security experts with certifications like the SSCP continues to grow as the increasing number of cybersecurity attacks continues to rise.

3

GLOBALLY RECOGNIZED

Earn an systems security certification from the world renowned leader in cybersecurity.

Course guide

Qualification: SSCP

Study time: Full time – five to six days | Part time – six weeks

Vendor: (ISC)²

Student support: Success Advisors

Prerequisites: One year+ experience in information security + subscription to (ISC)² Code of Ethics recommended

Assessment: Exam based – SSCP

Resources: Internet access and email

Ideal for: Senior network security engineers, senior security systems analysts or senior security administrators

Modules

SSCP introduction

  • Information security
  • SSCP
  • CBK
  • Security concerns

Access control

  • Identification, authentication, authorisation and accounting
  • Access control techniques
  • Best practices for access control
  • Access control administration
  • Access control models, methodologies and implementation Physical security
  • Attacks
  • Monitoring and intrusion detection
  • Penetration testing

Administration

  • The C.I.A. triad policy, standards, guidelines and baselines
  • Privacy issues and regulation
  • Data classification
  • Security architecture and design
  • Controls, evaluation criteria and security models
  • Development lifecycle
  • Configuration management
  • Hardware components
  • Employment practices
  • Security threats and attacks

Audit and monitoring

  • Types of controls
  • Incident response and analysis
  • Monitoring devices and techniques

Cryptography

  • Cryptographic terms and technologies
  • Message authentication
  • Certificate authority

Data communications

  • Security overview
  • Internet, intranet and extranet security
  • TCP/IP LANs, WANs and VPNs
  • Network layer security protocols
  • Transport layer security
  • Application layer security protocols

Malicious code and malware

  • Malicious code types
  • Mobile code threats
  • Types of attacks

Risk response and recovery

  • Risk management
  • Knowledge based systems
  • Safeguards and countermeasures
  • Incident handling
  • Forensics Business continuity project planning

Get certified the KnowledgeNet way

Professional development that works around you

  • World’s #1 eLearning portal
  • 12 months unlimited access
  • Expert mentors
  • Test prep
  • Global community of peers
  • Award winning training used globally by leading corporate clients

AVERAGE SALARY

2013
2014
2015
2016
2017
JAN
JUL
JAN
JUL
JAN
JUL
JAN
JUL
JAN
DON'T MISS OUT
Ask about our monthly promotions. Save big on training and certifications to sharpen your skills!
First Name * Last Name *
* *
end
close-link